On-Demand Link Padding in Traffic Anonymizing
暂无分享,去创建一个
[1] Deborah Estrin,et al. Advances in network simulation , 2000, Computer.
[2] H. T. Kung,et al. Design and analysis of an IP-Layer anonymizing infrastructure , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[3] Sally Floyd,et al. Wide-area traffic: the failure of Poisson modeling , 1994 .
[4] Tom Lyche,et al. Curves and Surfaces , 2014, Lecture Notes in Computer Science.
[5] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.
[6] D. Estrin,et al. RSVP: a new resource reservation protocol , 1993, IEEE Communications Magazine.
[7] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[8] Von Seggern,et al. CRC standard curves and surfaces , 1993 .
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.